deadbeefmonster
I work as a pentester. I like to hack things. I do not post much on GitHub. I have worked professionally as a sysadmin, DBA, & programmer. I'll make you laugh.
Dallas, Texas, USA
deadbeefmonster's Stars
seemoo-lab/nexmon
The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more
ytisf/theZoo
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
ralphte/arm-yourself-talk
How to ARM Yourself - Bsides Tampa 2020
madhuakula/security-automation-with-ansible-2
Ansible Playbooks for Security Automation with Ansible2 book
madhuakula/pwn_jenkins
Notes about attacking Jenkins servers
madhuakula/wincmdfu
Windows one line commands that make life easier, shortcuts and command line fu.
madhuakula/kubernetes-goat
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
blaCCkHatHacEEkr/PENTESTING-BIBLE
articles
51x/WHP
Micro$oft Windows Hacking Pack
s1l3ntk1ll3r/Pen-Testing
Learnings from OSCP and other random stuff.
initinfosec/OSCP-Exam-Report-Generator-From-Markdown
:orange_book: OSCP Exam Report Template in Markdown
j00ru/windows-syscalls
Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)
tinkersec/scratchpad
Proofs of Concept. Just fucking around.
m0nad/Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
EONRaider/blackhat-python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
trustedsec/ptf
The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.
trustedsec/trevorc2
TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.
trustedsec/unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
davidprowe/BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
GhostPack/SharpUp
SharpUp is a C# port of various PowerUp functionality.
GhostPack/Seatbelt
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
AonCyberLabs/Windows-Exploit-Suggester
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
411Hall/JAWS
JAWS - Just Another Windows (Enum) Script
PowerShellMafia/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
rasta-mouse/Watson
Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities
peass-ng/PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
antonioCoco/RoguePotato
Another Windows Local Privilege Escalation from Service Account to System
drduh/macOS-Security-and-Privacy-Guide
Guide to securing and improving privacy on macOS
tjnull/TJ-JPT
This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used in Joplin
TCM-Course-Resources/Windows-Privilege-Escalation-Resources
Compilation of Resources from TCM's Windows Priv Esc Udemy Course